Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 24 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
24
Dung lượng
261,05 KB
Nội dung
Chapter 4 Security 73 Administration Level Security Mac OS X Server can use another level of access control for added security. Administrators can be assigned to services they can configure. These limitations are enacted on a server-by-server basis. This method can be used by an administrator with no restrictions to assign administrative duties to other admin group users. This results in a tiered administration model, where some administrators have more privileges than others for assigned services. This results in a method of access control for individual server features and services. For example, Alice (the lead administrator) has control over all services on a given server and can limit the ability of other admin group users (like Bob and Cathy) to change settings on the server. She can assign DNS and Firewall service administration to Bob, while leaving mail service administration to Cathy. In this scenario, Cathy can’t change the firewall or any service other than mail. Likewise, Bob can’t change any services outside of his assigned services. Tiered administration controls are effective in Server Admin and the serveradmin command-line tool. They are not effective against modifying the various UNIX configuration files throughout the system. The UNIX configuration files must be protected with POSIX-type permissions or ACLs. Setting Administration Level Privileges You can determine which services other admin group users can modify. To do this, the administrator making the determination must have full, unmodified access. The process for setting administration level privileges is found in “Tiered Administration Permissions” on page 151. Service Level Security You use a Service Access Control List (SACL) to enforce who can use a given service. It is not a means of authentication. It is a list of those who have access rights to use a given service. SACLs allow you to add a layer of access control on top of standard and ACL permissions. Only users and groups in a SACL can access its corresponding service. For example, to prevent users from accessing AFP share points on a server, including home folders, remove the users from the AFP service’s SACL. 74 Chapter 4 Security Server Admin in Mac OS X Server allows you to configure SACLs. Open Directory authenticates user accounts and SACLs authorize use of services. If Open Directory authenticates you, the SACL for login window determines whether you can log in, the SACL for AFP service determines whether you can connect for Apple file service, and so on. Setting SACL Permissions SACLs (Service access control lists) allow you to specify which users and groups have access to Mac OS X Server services, including AFP, FTP, and Windows file services. To set SACL permissions for a service: 1 Open Server Admin. 2 Select the server from the Servers list. 3 Click Settings. 4 Click Access. 5 To restrict access to all services or deselect this option to set access permissions per service, select “For all services”. 6 If you have deselected “For all services,” select a service from the Service list. 7 To provide unrestricted access to services, click “Allow all users and groups” . If you want to restrict access to certain users and groups: a Select “Allow only users and groups below.” b Click the Add (+) button to open the Users & Groups drawer. c Drag users and groups from the Users & Groups drawer to the list. 8 Click Save. Security Best Practices Server administrators must make sure that adequate security measures are implemented to protect a server from attacks. A compromised server risks the resources and data on the server and risks the resources and data on other connected systems. The compromised system can then be used as a base to launch attacks on other systems within or outside your network. Securing servers requires an assessment of the cost of implementing security with the likelihood of a successful attack and the impact of that attack. It is not possible to eliminate all security risks, but it is possible to minimize risks to efficiently deal with them. Chapter 4 Security 75 Best Practices for server system administration include, but are not limited to:  Updating your systems with critical security patches and updates.  Checking for updates regularly.  Installing appropriate antivirus tools, using them regularly, and updating virus definition files and software regularly. Although viruses are far less prevalent on the Mac platform than on Windows, viruses still pose a risk.  Restricting physical access to the server. Because local access generally allows an intruder to bypass most system security, secure the server room, server racks, and network junctures. Use security locks. Locking your systems is a prudent thing to do.  Making sure there is adequate protection against physical damage to servers and ensuring the functioning of the climate control of the server room.  Taking all additional precautions to secure servers. For example, enable Open firmware passwords, encrypt passwords where possible, and secure backup media.  Securing logical access to the server. For example, remove or disable unnecessary accounts. Accounts for outside parties should be disabled when not in use.  Configuring SACLs as needed. Use SACLs to specify who can access services.  Configuring ACLs as needed. Use ACLs to control who can access share points and their contents.  Protecting any account with root or system administrator privileges by following recommended password practices using strong passwords. For more specific information about passwords, see “Password Guidelines” on page 76 .  Not using administrator (UNIX “admin” group) accounts for daily use. Restrict the use of administration privileges by keeping the admin login and password separate from daily use.  Backing up critical data on the system regularly, with a copy stored at a secure off- site location. Backup media is of little use in recovery if it is destroyed along with the computer during a machine room fire. Backup/Recovery contingency plans should be tested to ensure that recovery actually works.  Reviewing system audit logs regularly and investigating unusual traffic. 76 Chapter 4 Security  Disabling services that are not required on your system. A vulnerability that occurs in any service on your system can compromise the entire system. In some cases, the default configuration (out of the box) of a system leads to exploitable vulnerabilities in services that were enabled implicitly. Turning on a service opens up a port from which users can access your system. Although enabling Firewall service helps fend off unauthorized access, an inactive service port remains a vulnerability that an attacker might be able to exploit.  Enabling Firewall service on servers, especially at the network frontier. Your server’s firewall is the first line of defense against unauthorized access. For more information, see the chapter on setting up Firewall service in Network Services Administration. Consider also a third-party hardware firewall as an additional line of defense if your server is highly prone to attack.  If needed, installing a local firewall on critical or sensitive servers. Implementing a local firewall protects the system from an attack that might originate from within the organization’s network or from the Internet.  For additional protection, implementing a local Virtual Private Network (VPN) that provides a secure encrypted tunnel for all communication between a client computer and your server application. Some network devices provide a combination of functions: firewall, intrusion detection, and VPN.  Administering servers remotely. Manage your servers remotely using applications like Server Admin, Server Monitor, RAID Admin, and Apple Remote Desktop. Minimizing physical access to the systems reduces the possibility of mischief. Password Guidelines Many applications and services require that you create passwords to authenticate. Mac OS X includes applications that help create complex passwords (using Password Assistant), and securely store your passwords (using Keychain Access). Creating Complex Passwords Use the following tips to create complex passwords:  Use a mix of alphabetic (upper and lower case), numeric, and special characters (such as ! and @).  Don’t use words or combinations of words found in a dictionary of any language.  Don’t append a number to an alphabetic word (for example, “wacky2”) to fulfill the constraint of having a number.  Don’t substitute “look alike” numbers or symbols for letters (for example, “GR33N” instead of “GREEN”).  Don’t use proper names. Chapter 4 Security 77  Don’t use dates.  Create a password of at least 12 characters. Longer passwords are generally more secure than shorter passwords.  Use passwords that can’t be guessed even by someone who knows you and your interests well.  Create as random a password as possible. You can use Password Assistant (located in /System/Library/CoreServices/ to verify the complexity of your password. 78 Chapter 4 Security 5 79 5 Installation and Deployment Whether you install Mac OS X Server on a single server or a cluster of servers, there are tools and processes to help the installation and deployment succeed. Some computers come with Mac OS X Server software already installed. Other computers need to have the server software installed. For example, installing Leopard Server on a computer with Mac OS X makes the computer a server with Mac OS X Server. Installing Leopard Server on an existing server with an Mac OS X Server v10.2–10.4 upgrades the server software to v10.5. If Leopard Server is already installed, installing it again refreshes the server environment. This chapter includes instructions for a fresh installation of Leopard Server using a variety of methods. Installation Overview You’ve already planned and decided how many and what kind of servers you are going to install. Step 1: Confirm you meet the requirements Make sure your target server meets the minimum system requirements. For more information see:  “System Requirements for Installing Mac OS X Server” on page 81  “Hardware-Specific Instructions for Installing Mac OS X Server” on page 81 Step 2: Gather your information Gather all the information you need before you begin. This not only helps to make sure the installation goes smoothly, but it can help you make certain planning decisions. For further information, see:  Chapter 2, “Planning,” on page 25  Appendix , “Mac OS X Server Advanced Worksheet,” on page 197 80 Chapter 5 Installation and Deployment  “About The Server Installation Disc” on page 82 Step 3: Set up the environment If you are not in complete control of the network environment (DNS servers, DHCP server, firewall, and so forth) you need to coordinate with your network administrator before installing. A functioning DNS system, with full reverse lookups, and a firewall to allow configuration constitute a bare minimum for the setup environment. If you are planning on connecting the server to an existing directory system, you also need to coordinate efforts with the directory administrator. See the following:  “Connecting to the Directory During Installation” on page 83  “Installing Server Software on a Networked Computer” on page 83 If you are administering the server from another computer, you must create an administration computer. For more information, see “Preparing an Administrator Computer” on page 82. Step 4: Start up the computer from an installation disk You can’t install onto the disk the computer is booted from, but you can upgrade. For clean installations and upgrades, you must start up the server from an installation disk, not from the target disk. See the following:  “About Starting Up for Installation” on page 83  “Remotely Accessing the Install DVD” on page 84  “Starting Up from the Install DVD” on page 86  “Starting Up from an Alternate Partition” on page 86  “Starting Up from a NetBoot Environment” on page 90 Step 5: Prepare the target disk If you are doing a clean installation, you must prepare the target disk by making sure it has the right format and partition scheme. See the following:  “Preparing Disks for Installing Mac OS X Server” on page 91  “Choosing a File System” on page 91  “Partitioning a Hard Disk” on page 93  “Creating a RAID Set” on page 94  “Erasing a Disk or Partition” on page 97 Step 6: Start the installer The installer application takes software from the startup disk and server software packages and installs them on the target disk. See the following:  “Identifying Remote Servers When Installing Mac OS X Server” on page 98  “Installing Server Software Interactively” on page 99  “Installing Locally from the Installation Disc” on page 99  “Installing Remotely with Server Assistant” on page 101 Chapter 5 Installation and Deployment 81  “Installing Remotely with VNC” on page 102  “Using the installer Command-Line Tool to Install Server Software” on page 103 Step 7: Set up services Restart from the target disk to proceed to setup. For more information about server setup, see “Initial Server Setup” on page 107. System Requirements for Installing Mac OS X Server The Macintosh desktop computer or server where you install Mac OS X Server v10.5 Leopard must have:  An Intel or PowerPC G4 or G5 processor, 867 MHz or faster  Built-in FireWire  At least 1 gigabyte (GB) of random access memory (RAM)  At least 10 gigabytes (GB) of disk space available  A new serial number for Mac OS X Server 10.5. The serial number used with any previous version of Mac OS X Server will not allow registration in v10.5. A built-in DVD drive is convenient but not required. A display and keyboard are optional. You can install server software on a computer that has no display and keyboard by using an administrator computer. For more information, see “Preparing an Administrator Computer” on page 82. If you’re using an installation disc for Mac OS X Server v10.5 or later, you can control installation from another computer using VNC viewer software. Open source VNC viewer software is available. Apple Remote Desktop, described on page 51, includes VNC viewer capability. Hardware-Specific Instructions for Installing Mac OS X Server When you install server software on Xserve systems, the procedure you use when starting the computer for installation is specific to the kind of Xserve hardware you have. You may need to refer to the Xserve User’s Guide or Xserve Setup Guide that came with your Xserve, where these procedures are documented. Gathering the Information You Need Use the “Mac OS X Server Advanced Worksheet” to record information for each server you want to install. The information below provides supplemental explanations for items on the “Mac OS X Server Advanced Worksheet”. The “Mac OS X Server Advanced Worksheet” is located in the appendix on page 197. 82 Chapter 5 Installation and Deployment Preparing an Administrator Computer You can use an administrator computer to install, set up, and administer Mac OS X Server on another computer. An administrator computer is a computer with Mac OS X v10.5 Leopard or Mac OS X Server Leopard that you use to manage remote servers. When you install and set up Mac OS X Server on a computer that has a display and keyboard, it’s already an administrator computer. To make a computer with Mac OS X into an administrator computer, you must install additional software. Important: If you have administrative applications and tools from Mac OS X Server v10.4 Tiger or earlier, do not use them with Leopard Server. To enable remote administration of Mac OS X Server from a Mac OS X computer: 1 Make sure the Mac OS X computer has Mac OS X v10.5 Leopard installed. 2 Make sure the computer has at least 1 GB of RAM and 1 GB of unused disk space. 3 Insert the Administration Tools CD. 4 Open the Installers folder. 5 Open ServerAdministrationSoftware.mpkg to start the Installer, and then follow the onscreen instructions. About The Server Installation Disc You can install the server software using the Mac OS X Server Install Disc. This installation disc contains everything you must install Mac OS X Server. It also contains an Other Installs folder, which has installers for upgrading a Mac OS X computer to Mac OS X Server and for separately installing server administration software, the Directory application, the Podcast Capture application, X11 software, and Xcode developer tools. In addition to the installation disc, Mac OS X Server includes the Administration Tools CD. You use this disc to set up an administrator computer. This disc also contains installers for the Directory application, the Podcast Capture application, and the QTSS Publisher application. For advanced administrators, this disc contains installers for PackageMaker and Property List Editor. [...]... Installer.dmg -t ExtraHD erase ∏ Tip: Step 4: Select the alternate partition as the startup disk systemsetup systemsetup systemsetup -setstartupdisk “/Volumes /Mac OS X Server Install Disk” shutdown -r systemsetup Step 1: Create a NetInstall image from the Install DVD Step 2: Start up the computer from the NetBoot server     Preparing Disks for Installing Mac OS X Server WARNING: Choosing a File System... enter an IP address in IPv4 format (000.000.000.000) If you don’t know the IP address and the remote server is on the local subnet, you can use the sa_srchr command to identify computers on the local subnetwhere you can install server software Enter the following from an existing computer with Mac OS X Server Tools installed: /System/Library/Serversetup/sa_srchr 2 24. 0.0.1 84 Chapter 5 Installation and... from the Install DVD for Mac OS X Server v10.5 or later The procedure you use depends on the target server hardware To learn more about startup disk options, see “About Starting Up for Installation” on page 83 2 Use your VNC viewer software to open a connection to the target server 3 Identify the target server If the VNC viewer includes the target server in a list of available servers, select it in... look for a label on the server If you’re installing on an older computer that has no built-in hardware serial number, use 12 345 678 for the password If you don’t know the IP address and the remote server is on the local subnet, you can use the sa_srchr command to identify computers on the local subnet where you can install server software Enter the following from an existing computer with Mac OS X Server. .. Install DVD for Mac OS X Server v10.5 or later The procedure you use depends on the target server hardware To learn more about startup disk options, see “About Starting Up for Installation” on page 83 2 Use the Terminal to open a secure shell connection to the target server The user name is root and the password is the first eight digits of the server s built-in hardware serial number To find a server s... If you want to use a server as an Open Directory master, make sure it has an active Ethernet connection to a secure network before installation and initial setup Installing Server Software on a Networked Computer When you start up a computer from a server installation disc, SSH starts so that remote installations can be performed Important: Before you install or reinstall Mac OS X Server, make sure the... configuration Server Assistant looks for saved setup data on all mounted disks and in all directories the server is configured to access The saved setup data will overwrite the server s existing settings For more information about automatic server setup, see “Using Automatic Server Setup” on page 117 Remotely Accessing the Install DVD When used as the startup disc, the Install DVD provides some services for. .. (in addition to other information) of servers on the local subnet that started up from the installation disk 4 When prompted for a password, enter the first eight digits of the server s built-in hardware serial number To find a server s serial number, look for a label on the server If you’re installing on an older computer that has no built-in hardware serial number, use 12 345 678 for the password If you’re... files currently active in the booted system partition for the new installation Chapter 5 Installation and Deployment 83 Before Starting Up If you’re performing a clean installation rather than upgrading an existing server, back up any user data that’s on the disk or partition where you’ll install the server software If you’re upgrading an existing server, make sure that saved setup data won’t be inadvertently... addresses to servers If your server gets its IP address through DHCP, set up a static mapping in the DHCP server, so your server gets (via its Ethernet address) the same IP address every time  Firewall or routing: In addition to any firewall running on your server, the subnet router may have certain network traffic restrictions in place Make sure you server s IP address is available for the traffic . tools from Mac OS X Server v10 .4 Tiger or earlier, do not use them with Leopard Server. To enable remote administration of Mac OS X Server from a Mac OS X computer: 1 Make sure the Mac OS X computer. the server software installed. For example, installing Leopard Server on a computer with Mac OS X makes the computer a server with Mac OS X Server. Installing Leopard Server on an existing server. and administer Mac OS X Server on another computer. An administrator computer is a computer with Mac OS X v10 .5 Leopard or Mac OS X Server Leopard that you use to manage remote servers. When